I'm an IT strategist and have been working in the corporate Information Technology field for almost 20 years. I was on the Internet when:
The technology keeps changing but how we approach security hasn't changed much in hundreds, or even thousands of years. The key is to know how to apply it today.
Technology helps us be more productive. It makes our
everyday lives more convenient and fun. We are in the middle of a technology
Technology enables us to:
Technology innovation is moving at a rapid pace. Just as we learn how to use our current
computer or phone, a new one is available with even more features.
As manufacturers race to release new products and services, they are not as concerned with their security. They are not trying too hard to protect our privacy and personal information and data. This is because no one holds them accountable.
If someone breaks into your computer or phone and steals your personal information to open a credit card in your name and order a lot of big-ticket items, no one is held responsible. You have to jump through hoops to recover your stolen identity. The credit card company will remove the fraudulent charges, but they will not help you fix your credit score.
We cannot live our lives without computers today. To have one is a basic need. And to have a secure one is more important than ever.
You can only protect your computer, smart phone and home network if you are aware of the dangers and know how to defend your digital turf.
I've been studying and implementing computer security for almost 20 years and use this website to share my research.
In addition to many years of experience working for a range of companies from startups to global organizations, I hold a Bachelor of Science in Computer Science from California State University, and Masters of Science in Technology Management from Columbia University, and Computer Science from Pace University, respectively.
We don't control the initial security of the products we buy - computers, tablets, phones and smart home devices. But we can do our best to secure them anyway, to protect our personal information and data stored on them.